Analysis of future wireless technologies

Assignment Help Computer Networking
Reference no: EM132487265 , Length: word count:1500

BN303 - Wireless Network & Security - Melbourne Institute of Technology

Assessment - Analysis of Future Wireless Technologies

LO1: Utilise standards-based technologies used in various networks;
LO2: Test and compare the performance of various wireless networks;

Assessment Detail

You are a new wireless network engineer at the University of Future Technology in Australia. Your institute wishes to extend their connectivity throughout their lecture theatres and student service areas. The institute is becoming aware that the students require Internet access on their labtops and mobile phones during the lectures. The institute also realizes that the students may need to access and share many images and data during their lecturers.

The institute has its administrative office in the adjacent building with a line of sight view over the windows (open windows). Overall, the staff members are moving continuously, and they need full connectivity and accessibility to the Internet and Data Services.

Your operational director asks you to report on the available wireless technologies that can be used to serve the students during their lectures as well as to support the staff to be connected to the Internet and the data server.

The operational director is aware of the security concerns in Wireless Technologies; therefore, requests you to include security related issues for each of the selected technologies.

Your task is to select at least two of the following wireless technologies:
• ZigBee
• WiMax
• Bluetooth
• RFID
• WLAN
• IoT
• 5G

And you are to write a report for your director on:

Part 1. Introduction of the selected technologies

Part 2. Case studies of successful implementation of the selected technologies (e.g. successful use of RFID in a well known case example)

Part 3. The working mechanism of selected technologies (e.g. how does ZigBee work?)

Part 4. Potential benefits to the business using the selected wireless technologies

Part 5. Security vulnerabilities of the selected technologies

Part 6. Resolution and recommendations of a wireless technology for the business in the case study.

Attachment:- Analysis of Future Wireless Technologies.zip

Reference no: EM132487265

Questions Cloud

Social problems in terms of social pathology : Historically, U.S. sociologist have viewed social problems in terms of social pathology; "Bad" people where assumed to be the source of social problems
How is work gendered and sexed : How is work gendered and sexed? Provide an example. What are the differences in pay in gendered and sexed work? How might we remedy this disparity?
What is the quick ratio for quebec electronics : What is the quick ratio for Quebec Electronics in 2019? Has the quick ratio improved or not improved since 2018? Quebec Electronics has the following data
Lessen the effects of gender stratification : What can be done to lessen the effects of gender stratification in the workplace and on income inequality? How does gender stratification harm both men
Analysis of future wireless technologies : Utilise standards-based technologies used in various networks and Test and compare the performance of various wireless networks
What are consolidated total assets immediately : What are consolidated total assets immediately after the acquisition? On January 1, 2X18, Tallton Company acquired 100% of the outstanding common stock
Discuss the topic the future of blockchain : This week's reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future.
Does media have an influence on women : Does media have an influence on women? How they look? Is there a relationship between media portrayals of gender and ourselves?
What was the lexar net income : Lexar began 2017 with $628,000 in liabilities and ended the year with $287,000 in liabilities. Assuming Lexar paid $124,000 in dividends, Lexar 2017 net income

Reviews

Write a Review

Computer Networking Questions & Answers

  Create a multiprotocol operational network

Create a multiprotocol operational network using EIGRP, OSPF, and RIPv2 protocol.Implement a secure update of OSPF and EIGRP protocol.

  Propose a sub-network design

Propose a sub-network design that will meet the needs of Acme Corporation.

  Explain the reasons for your selection

Select a preferred supplier and briefly explain the reasons for your selection - provide the information that you are summarising. Higher marks will be awarded to answers which contain more complete information.

  Discuss where nhs would fall on a technological acceptance

Justify your recommendation based on the goals of NHS. Discuss where NHS would fall on a technological acceptance curve.

  Research paper should be on ethernet networking related to

it should be in api format.research paper should be on ethernet networking related to my specific subject which is

  Explain how to formulate a query

Determine the functional dependences - Build this model using MS Access by creating these tables and Relationships. Populate these tables with appropriate data

  Create a project plan for moving the data center

Describe the knowledge and processes areas of project management in accordance to the Project Management Institute Project Management Body of Knowledge (PMBOK®) Guide.

  Network''s fundamental characteristics and components.

Explain the network's fundamental characteristics and components.

  Cookies are us runs a series

Cookies are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day, the stores express-mail a CD

  Requiring permission

Requiring permission; a barrier between creating information and publishing it

  What are the two primary encryption techniques

When surfing online, you get some strange data on an apparently secure Web site, and you realize you need to check the legitimacy of the site.

  Discuss the many uses of gre and how you could secure it

Protocol 47 or GRE is one of the most flexible IP protocols in networking but it is insecure. Discuss the many uses of GRE and how you could secure it across insecure networks like the Internet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd